Bachelor of Science in Cybersecurity
Cybersecurity
Bachelor of Science Degree
Breadcrumb
- RIT/
- RIT Dubai/
- Academics and Learning/
- Undergraduate Degree Programs/
- Bachelor of Science in Cybersecurity
Accredited by the UAE Ministry of Education
In RIT’s Cybersecurity degree you’ll learn to preserve assets, identify security vulnerabilities, prove threats occurred, and design strategies for data recovery.
Overview
As technology advances at a rapid rate, protecting individuals, companies, government entities and global organizations from cyber threats is becoming a huge sector, with career opportunities spanning the globe. Our Bachelor of Science in Cybersecurity has been designed to prepare you to excel in this rapidly growing area. If you love computer science, crave a program that offers a hands-on curriculum and a range of active learning experiences and gives plenty of opportunities for independent exploration at an advanced level, the Bachelor of Science in Cybersecurity will be a perfect.
Considered a leading program in computing and network security and forensics by industry experts including the U.S. Department of Homeland Security, the Department of Defense and the National Security Agency, the degree offers you a high level of specialization beyond what is provided by more general majors in Information Systems or Information Technology. You’ll begin by getting to grips with a wide breadth of computing disciplines including programming, scripting, databases, computing security, cryptography, security policy, networks, systems and network administration. You’ll then have the chance to focus on a particular area of security such as forensics, mobile device forensics or network/computing system security. By the time you graduate you will be an expert in the identification of computer security vulnerabilities, the detection of computer security exploits, and the prevention or mitigation of the resulting attack, making you highly employable. Your job responsibilities may include security assessment, cybersecurity, network security, computer and network forensics, cryptography, penetration testing, information security risk management, and cyber policy & law.
Typical Job Titles
Assistant Reverse Engineer | Application Security Engineer |
Cyber Security Analyst | Cyber Threat Responder |
Security Software Specialist | Penetration Tester |
Security Assurance Engineer | Security Consultant |
Site Reliability Engineer | Threat Analyst |
Technical Assessments Consultant | Vehicle Cybersecurity Engineer |
Industries
Health Care
Government
Medical Devices
Electronic and Computer Hardware
Utilities and Renewable Energy
Internet and Software
Telecommunications
Mission Statement
The mission of the Cybersecurity program is to advance the state of the art in cybersecurity knowledge and provide world-class education in the knowledge, skills, and mindset needed to have a great career as a cybersecurity professional.
Program Educational Objectives
The Cybersecurity Program Educational Objectives (PEO) are broad statements that describe what graduates are expected to attain within a few years of graduation. Program educational objectives are based on the needs of the program’s constituencies. The Cybersecurity faculty, in conjunction with its constituents, has established the following program educational objectives:
- PEO 1: Graduates will be employable in cyber security and cyber forensics professional positions in both the private and public sectors.
- PEO 2: Graduates will have appropriate foundational skills to become lifelong learners within their field.
- PEO 3: Graduates will be prepared to work as team members and to adopt leadership positions as necessary.
- PEO 4: Graduates will be prepared for
Program Learning Outcomes
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s disciplines.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to the environment, hardware, software, and human aspects of a system.
- Assess the ethical ramifications of working in the security field
Curriculum
Students are required to complete 126 semester credit hours of core courses and advanced courses as well as cooperative education. Core courses include a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security. Advanced courses allow students to design the focus of their information security coursework.
Typical Course Sequence
Total Credit Hours - 126
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-140 |
Introduction to Cybersecurity
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
|
3 |
GCIS-123 |
Software Development and Problem Solving I
A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments.
|
4 |
GCIS-124 |
Software Development and Problem Solving II
A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security.
|
4 |
UWRT-150 |
FYW: Writing Seminar
Writing Seminar is a three-credit course limited to 19 students per section. The course is designed to develop first-year students’ proficiency in analytical and rhetorical reading and writing, and critical thinking. Students will read, understand, and interpret a variety of non-fiction texts representing different cultural perspectives and/or academic disciplines. These texts are designed to challenge students intellectually and to stimulate their writing for a variety of contexts and purposes. Through inquiry-based assignment sequences, students will develop academic research and literacy practices that will be further strengthened throughout their academic careers. Particular attention will be given to the writing process, including an emphasis on teacher-student conferencing, critical self-assessment, class discussion, peer review, formal and informal writing, research, and revision. Small class size promotes frequent student-instructor and student-student interaction. The course also emphasizes the principles of intellectual property and academic integrity for both current academic and future professional writing.
|
3 |
MATH-181 |
Calculus I
This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals.
|
4 |
MATH-182 |
Calculus II
This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates.
|
4 |
MATH-190 |
Discrete Mathematics for Computing
This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems.
|
|
NSSA-241 |
Introduction to Routing and Switching
This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered.
|
|
YOPS-010 |
RIT 365: RIT Connections
RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies.
|
0 |
General Education - Artistic Perspective A : Islamic Culture Course | 3 | |
Second Year | ||
CSEC-201 |
Programming for Information Security
This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities.
|
3 |
MATH-251 |
Probability and Statistics
This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications.
|
3 |
CSEC-202 |
Reverse Engineering Fundamentals
This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis.
|
3 |
NSSA-221 |
Systems Administration I
This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies.
|
|
MATH-241 |
Linear Algebra
This course is an introduction to the basic concepts of linear algebra, and techniques of matrix manipulation. Topics include linear transformations, Gaussian elimination, matrix arithmetic, determinants, vector spaces, linear independence, basis, null space, row space, and column space of a matrix, eigenvalues, eigenvectors, change of basis, similarity and diagonalization. Various applications are studied throughout the course.
|
3 |
PHYS-211 |
University Physics I
This is a course in calculus-based physics for science and engineering majors. Topics include kinematics, planar motion, Newton's Laws, gravitation, work and energy, momentum and impulse, conservation laws, systems of particles, rotational motion, static equilibrium, mechanical oscillations and waves, and data presentation/analysis. The course is taught in a workshop format that integrates the material traditionally found in separate lecture and laboratory courses.
|
4 |
PHYS-212 |
University Physics II
This course is a continuation of PHYS-211, University Physics I. Topics include electrostatics, Gauss' law, electric field and potential, capacitance, resistance, DC circuits, magnetic field, Ampere's law, inductance, and geometrical and physical optics. The course is taught in a lecture/workshop format that integrates the material traditionally found in separate lecture and laboratory courses.
|
4 |
CHMG-141 |
General and Analytical Chemistry I
This is a general chemistry course for students in the life and physical sciences. College chemistry is presented as a science based on empirical evidence that is placed into the context of conceptual, visual, and mathematical models. Students will learn the concepts, symbolism, and fundamental tools of chemistry necessary to carry on a discourse in the language of chemistry. Emphasis will be placed on the relationship between atomic structure, chemical bonds, and the transformation of these bonds through chemical reactions. The fundamentals of organic chemistry are introduced throughout the course to emphasize the connection between chemistry and the other sciences.
|
3 |
BIOG-140 |
Cell and Molecular Biology for Engineers I
This is the first course of a two-course sequence designed to introduce biomedical engineering students to the molecular and cellular basis of life with a particular emphasis on the integration of molecular systems that underscore human physiology. This course will start with the basic chemistry of biological macromolecules and then explore the cell starting from the nucleus and moving outward. Major topics will include: DNA replication; molecular basis of inheritance; the biology of RNA; gene expression; protein synthesis; the secretory pathways; and enzyme kinetics.
|
|
BIOG-240 |
Cell and Molecular Biology for Engineers II
This is the second of a two-course sequence designed to introduce biomedical engineering students to the molecular and cellular basis of life with a particular emphasis on the integration of molecular systems in human physiology. This course will continue exploring sub-cellular systems by touring the function of each cellular organelle and describing the pathologic consequences that result from interruption of its normal function. Major topics will include: cellular energy production; the cytoskeleton; the lysosome; the plasma membrane; vesicle transport; cell-cell communication; signaling pathways; the cell cycle; and cell division.
|
|
NSSA-245 |
Network Services
This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services.
|
|
CSEC-99 |
Cooperative Education Seminar
This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews.
|
0 |
General Education - Ethical Perspective | 3 | |
General Education - Social Perspective | 3 | |
Cooperative Education (summer) | ||
Third Year | ||
CSCI-462 |
Introduction to Cryptography
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication.
|
3 |
PUBL-363 |
Cyber Security Policy and Law
Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The
central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws.
|
3 |
CSEC-380 |
Principles of Web Application Security
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
|
3 |
CSEC-472 |
Authentication and Security Models
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
|
3 |
ISTE-230 |
Introduction to Database and Data Modeling
A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming.
|
3 |
Computing Security Electives 1 | 3 | |
Computing Security Electives 2 | 3 | |
General Education - Ethical Perspective | 3 | |
Free Electives 1 | 3 | |
Free Electives 2 | 3 | |
Cooperative Education (summer) | ||
Fourth Year | ||
PHIL-102 |
Introduction to Moral Issues
This course examines ethical questions that arise in the course of day-to-day individual and social life. Some consideration will be given to ethical theory and its application to such questions, but emphasis will be on basic moral questions and practical issues. Examples of typical issues to be examined are: What are the grounds for moral obligations like keeping promises or obeying the law? How do we reason about what to do? Examples of typical moral issues that may be introduced are capital punishment, euthanasia, abortion, corporate responsibility, the treatment of animals, and so forth.
|
3 |
PHIL-202 |
Foundations of Moral Philosophy
This course is a survey of foundational, and normative, approaches to moral philosophy and their motivating moral questions. Topics will include virtue ethics, deontology, consequentialism, and other approaches. Some of the questions to be examined are: How is human nature related to morality? What are the grounds for moral obligations? Is there an ultimate moral principle? How do we reason about what to do? Can reason determine how we ought to live? What are moral judgments? Are there universal goods? What constitutes a morally worthwhile life? Can morality itself be challenged?
|
3 |
PHIL-306 |
Professional Ethics
This course critically examines ethical issues that arise in professional life. The course will examine not only the general relationship between ethics and professional life but the particular consequences of ethical considerations within the student's own profession and the professions of others with whom the student must live and work.
|
3 |
CSEC-490 |
Capstone in Computing Security
This is a capstone course for students in the computing security program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.
|
3 |
Computing Security Electives 3 | 3 | |
Computing Security Electives 4 | 3 | |
Computing Security Electives 5 | 3 | |
Computing Security Electives 6 | 3 | |
General Education - Immersion 1 | 3 | |
General Education - Immersion 2 | 3 | |
General Education - Immersion 3 | 3 | |
Open Elective 3 | 3 | |
Open Elective 4 | 3 |
Advanced Electives
Students complete the advanced security electives that expand students’ knowledge in one of several disciplines of security, including system security, network security, forensics, malware, secure software development, database and application security, security evaluation, or theory.
A matriculated student in the BS in Computing Security is required to take 6 advanced elective courses. Three of the electives must come from one of the four clusters and the other three from the approved general list:
- Network and System Security
- Forensics and Malware
- Software Security, or
- Security Management and Evaluation
Currently, RIT Dubai is offering the following advanced courses:
- CSEC 461 Computer System Security (Network and System Security cluster)
- CSEC 462 Network Security and Forensics (Network and System Security cluster)
- CSEC 471 Penetration Testing Frameworks and Methodologies (Network and System Security cluster)
- CSEC 520 Cyber Analytics and Machine Learning (Approved general list of advanced electives)
- CSEC 463 Sensor Network Security (Approved general list of advanced electives)
- CSEC 465 Network & System Security Audit (Approved general list of advanced electives)
To graduate, students need to complete all the requirements as listed in the curriculum graduation policy
Program Laboratories
Computer Networking Lab
This lab is divided into four clusters. Each cluster has two sub-clusters with three adjacent PCs. A cabinet with at least one server, firewall, two routers, and four switches is dedicated for each of the four clusters. UTP and Console cables are available for students to connect these devices into a LAN, WAN and they can connect the event to the internet to install any additional required software or tool. This lab service mainly some courses such as CSEC 244 routing the switching, CSEC network security, and forensics as well as many other courses.
Computing Security Lab
The computing security lab provides students with a PC and access to the DTLAB in order to support a wide range of courses. Examples of these courses are penetration testing, security auditing, cyber defense, network forensic, digital forensics, and many more. Through this lab, students can coordinate the work to conduct security experiments that can include building a vulnerable environment, conduct various attacks, acquire information related to these attacks, and then try to mitigate them. Access to the DTLAB provides students with private cloud support that allow them to spin various virtual machines, connect them via a network, and study the various security issues.
Digital Transformation Lab
The digital transformation lab at RIT Dubai is funded by the TRA ICT fund and was established in 2018. The aim of this lab is in the research and development of secure and smart solutions across a number of verticals that support digitization for government, enterprise, and education.
Advisory Board
Mr. Eyad Shihabi |
Mr. Taha Khalifa |
Dr. Ayman El Nashar |
Mr. Ghanim Al Falasi |
Ms. Diyaa Zebian |
Mr. Bashar Kilani |
Ms. Ghada Elkeissi |
Dr. Mahmoud Sherif |
Dr. Raed Shubair |